nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ADAMAS: Interweaving unicode and color to enhance CAPTCHA security
|
Roshanbin, Narges |
|
2016 |
55 |
C |
p. 289-310 22 p. |
artikel |
2 |
An algorithm for efficient privacy-preserving item-based collaborative filtering
|
Li, Dongsheng |
|
2016 |
55 |
C |
p. 311-320 10 p. |
artikel |
3 |
Analysis of a trust model for SLA negotiation and enforcement in cloud markets
|
Macías, Mario |
|
2016 |
55 |
C |
p. 460-472 13 p. |
artikel |
4 |
Analyzing Hadoop power consumption and impact on application QoS
|
Conejero, Javier |
|
2016 |
55 |
C |
p. 213-223 11 p. |
artikel |
5 |
A new technique for efficient live migration of multiple virtual machines
|
Sun, Gang |
|
2016 |
55 |
C |
p. 74-86 13 p. |
artikel |
6 |
A novel virtual node approach for interactive visual analytics of big datasets in parallel coordinates
|
Huang, Mao Lin |
|
2016 |
55 |
C |
p. 510-523 14 p. |
artikel |
7 |
A secure dynamic collaboration environment in a cloud context
|
Piechotta, Chris |
|
2016 |
55 |
C |
p. 165-175 11 p. |
artikel |
8 |
A survey of anomaly detection techniques in financial domain
|
Ahmed, Mohiuddin |
|
2016 |
55 |
C |
p. 278-288 11 p. |
artikel |
9 |
Auditable versioned data storage outsourcing
|
Esiner, Ertem |
|
2016 |
55 |
C |
p. 17-28 12 p. |
artikel |
10 |
Automated configuration support for infrastructure migration to the cloud
|
García-Galán, Jesús |
|
2016 |
55 |
C |
p. 200-212 13 p. |
artikel |
11 |
Capacity-driven utility model for service level agreement negotiation of cloud services
|
Ranaldo, Nadia |
|
2016 |
55 |
C |
p. 186-199 14 p. |
artikel |
12 |
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph
|
Chen, Shuhong |
|
2016 |
55 |
C |
p. 391-400 10 p. |
artikel |
13 |
Contents
|
|
|
2016 |
55 |
C |
p. iii-v nvt p. |
artikel |
14 |
Delivering cloud services with QoS requirements: Business opportunities, architectural solutions and energy-saving aspects
|
Quarati, Alfonso |
|
2016 |
55 |
C |
p. 403-427 25 p. |
artikel |
15 |
Digital library interoperability at high level of abstraction
|
Agosti, Maristella |
|
2016 |
55 |
C |
p. 129-146 18 p. |
artikel |
16 |
dragon: Multidimensional range queries on distributed aggregation trees
|
Carlini, Emanuele |
|
2016 |
55 |
C |
p. 101-115 15 p. |
artikel |
17 |
Dynamic counter-measures for risk-based access control systems: An evolutive approach
|
Díaz-López, Daniel |
|
2016 |
55 |
C |
p. 321-335 15 p. |
artikel |
18 |
Economics of computing services
|
Bañares, José Ángel |
|
2016 |
55 |
C |
p. 401-402 2 p. |
artikel |
19 |
Editorial Board
|
|
|
2016 |
55 |
C |
p. IFC- 1 p. |
artikel |
20 |
Estimation and forecasting of ecological efficiency of virtual machines
|
Katsaros, Gregory |
|
2016 |
55 |
C |
p. 480-494 15 p. |
artikel |
21 |
Fast authentication in wireless sensor networks
|
Benzaid, Chafika |
|
2016 |
55 |
C |
p. 362-375 14 p. |
artikel |
22 |
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks
|
Lounis, Ahmed |
|
2016 |
55 |
C |
p. 266-277 12 p. |
artikel |
23 |
Hybrids of support vector machine wrapper and filter based framework for malware detection
|
Huda, Shamsul |
|
2016 |
55 |
C |
p. 376-390 15 p. |
artikel |
24 |
HyperFlow: A model of computation, programming approach and enactment engine for complex distributed workflows
|
Balis, Bartosz |
|
2016 |
55 |
C |
p. 147-162 16 p. |
artikel |
25 |
Impact of user patience on auto-scaling resource capacity for cloud services
|
de Assunção, Marcos Dias |
|
2016 |
55 |
C |
p. 41-50 10 p. |
artikel |
26 |
Low-time complexity budget–deadline constrained workflow scheduling on heterogeneous resources
|
Arabnejad, Hamid |
|
2016 |
55 |
C |
p. 29-40 12 p. |
artikel |
27 |
Matchmaking semantic security policies in heterogeneous clouds
|
Di Modica, Giuseppe |
|
2016 |
55 |
C |
p. 176-185 10 p. |
artikel |
28 |
Modeling BitTorrent choking algorithm using game theory
|
Azzedin, Farag |
|
2016 |
55 |
C |
p. 255-265 11 p. |
artikel |
29 |
Multi-criteria and satisfaction oriented scheduling for hybrid distributed computing infrastructures
|
Moca, Mircea |
|
2016 |
55 |
C |
p. 428-443 16 p. |
artikel |
30 |
Multi-provider cloud computing network infrastructure optimization
|
Banditwattanawong, Thepparit |
|
2016 |
55 |
C |
p. 116-128 13 p. |
artikel |
31 |
New Horizons of Cloud Computing
|
Helfert, Markus |
|
2016 |
55 |
C |
p. 163-164 2 p. |
artikel |
32 |
Optimising resource costs of cloud computing for education
|
Koch, Fernando |
|
2016 |
55 |
C |
p. 473-479 7 p. |
artikel |
33 |
Reliability-driven scheduling of time/cost-constrained grid workflows
|
Kianpisheh, Somayeh |
|
2016 |
55 |
C |
p. 1-16 16 p. |
artikel |
34 |
Resource management for bursty streams on multi-tenancy cloud environments
|
Tolosana-Calasanz, Rafael |
|
2016 |
55 |
C |
p. 444-459 16 p. |
artikel |
35 |
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows
|
Wang, Mingzhong |
|
2016 |
55 |
C |
p. 524-533 10 p. |
artikel |
36 |
Role mining using answer set programming
|
Ye, Wei |
|
2016 |
55 |
C |
p. 336-343 8 p. |
artikel |
37 |
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts
|
Wang, Wei |
|
2016 |
55 |
C |
p. 353-361 9 p. |
artikel |
38 |
Secure privacy vault design for distributed multimedia surveillance system
|
Rahman, Sk. Md. Mizanur |
|
2016 |
55 |
C |
p. 344-352 9 p. |
artikel |
39 |
Service level agreement based adaptive Grid superscheduling
|
Hasanzadeh Mofrad, Mohammad |
|
2016 |
55 |
C |
p. 62-73 12 p. |
artikel |
40 |
Static scheduling of multiple workflows with soft deadlines in non-dedicated heterogeneous environments
|
Bochenina, Klavdiya |
|
2016 |
55 |
C |
p. 51-61 11 p. |
artikel |
41 |
The mediator authorization-security model for heterogeneous semantic knowledge bases
|
Alamri, Abdullah |
|
2016 |
55 |
C |
p. 227-237 11 p. |
artikel |
42 |
TIRIAC: A trust-driven risk-aware access control framework for Grid environments
|
Dorri Nogoorani, Sadegh |
|
2016 |
55 |
C |
p. 238-254 17 p. |
artikel |
43 |
Top- k followee recommendation over microblogging systems by exploiting diverse information sources
|
Chen, Hanhua |
|
2016 |
55 |
C |
p. 534-543 10 p. |
artikel |
44 |
Toward integrity assurance of outsourced computing — a game theoretic perspective
|
Wang, Yongzhi |
|
2016 |
55 |
C |
p. 87-100 14 p. |
artikel |
45 |
Trust, Security and Privacy in Emerging Distributed Systems
|
Abawajy, Jemal |
|
2016 |
55 |
C |
p. 224-226 3 p. |
artikel |
46 |
Value creation in software service platforms
|
Haile, Netsanet |
|
2016 |
55 |
C |
p. 495-509 15 p. |
artikel |